×

Modular software security

  • US 4,888,798 A
  • Filed: 08/07/1986
  • Issued: 12/19/1989
  • Est. Priority Date: 04/19/1985
  • Status: Expired due to Term
First Claim
Patent Images

1. A protection method for restricting access by a user to authorized ones of a plurality of software elements in a computer system where the computer system permanently stores an identity key, Ik distinguishing the computer system from other computer systems having the same software elements, comprising,inputting a capability key, Ck, into the computer system for unlocking a selecting one of said plurality of software elements, said capability key specifying authorization being possessed by the user with respect to said selected software element in said system,accessing an identity key, Ik, stored in the computer system for identifying the computer system,transforming the capability key with the identity key to form a transformed key, Tk, including,transforming the identity key, Ik, by at least one operation to form more than one control number, Bi,successively transforming the capability key, Ck, using said control numbers, Bi, and a set of reversible transformation functions Fi to form the transformed capability key, Tk, as follows,


  • space="preserve" listing-type="equation">B.sub.i F.sub.i X.sub.i-1 =X.sub.i, i=1,2 . . . N
whereinX0 =CkXN =Tk,accessing a stored key Sk, for said selected software element, said stored key defining authorization being expected for unlocking said selected software element,compairing said transformed key, Tk, and said stored key Sk,allowing access to said selected software element if the stored key corresponding to said selected software element matches said transformed key.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×